mariamheny3766 mariamheny3766
  • 04-08-2017
  • Computers and Technology
contestada

______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:

a. viruses

b. worms

c. trojan horses

d. back doors

e. alien software

Respuesta :

kphung76127
kphung76127 kphung76127
  • 04-08-2017
The best answer is A, viruses.
Answer Link

Otras preguntas

Which statesman was best known for his ability to foster compromise? Stephen Douglas Henry Clay John C. Calhoun Andrew Jackson Which compromise established that
Write the equation of a line that passes through the points (-8, 8) and (0, 1).
What can communities do to address the goals of Healthy People 2010?
1) What is the common ratio of the following geometric sequence? . 5, 15, 45,… .
Isabella worked 50 hours over the past two weeks, and she gets paid by the hour. During the first week of the two-week span, she worked 30 hours and got paid $
What innovations did ancient Mesopotamian pass on to later civilizations
Which regular polygon can be used to form a tessellation? The sum of the measures of the angles of each polygon is given. A) octagon; 1080° B) nonagon; 1260° C)
write 98.69 in expanded form
An ______ is a physical location where economic activity takes place such as farms, offices, and factories.
Charlene works at a button factory she packs buttons in 100 boxes how many boxes will charlene need to pack 1500 buttons